General

  • Target

    3cfc109d784fb5b81ccdd3b1e66deb15a7050a98771005ebe34d755b212dc23e

  • Size

    1016KB

  • Sample

    221123-w7vs5seb22

  • MD5

    521fd896b6374beaa621bb0598032c30

  • SHA1

    b071e5bac7615f8beaefde4b0b9badf753ea6b2b

  • SHA256

    3cfc109d784fb5b81ccdd3b1e66deb15a7050a98771005ebe34d755b212dc23e

  • SHA512

    876b40c0b0ea5600944d44d4c3354034197457c455f1acc655a00f171389e0b03cef71b1b0bc17db4c4238c8eebe808732097b08f09feb1b5192ecf666f4f89d

  • SSDEEP

    12288:51IXsgtvm1De5YlOx6lzBH46Uzf7lXUW:51U81yMBbE

Malware Config

Targets

    • Target

      3cfc109d784fb5b81ccdd3b1e66deb15a7050a98771005ebe34d755b212dc23e

    • Size

      1016KB

    • MD5

      521fd896b6374beaa621bb0598032c30

    • SHA1

      b071e5bac7615f8beaefde4b0b9badf753ea6b2b

    • SHA256

      3cfc109d784fb5b81ccdd3b1e66deb15a7050a98771005ebe34d755b212dc23e

    • SHA512

      876b40c0b0ea5600944d44d4c3354034197457c455f1acc655a00f171389e0b03cef71b1b0bc17db4c4238c8eebe808732097b08f09feb1b5192ecf666f4f89d

    • SSDEEP

      12288:51IXsgtvm1De5YlOx6lzBH46Uzf7lXUW:51U81yMBbE

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks